Hacker Newsnew | past | comments | ask | show | jobs | submit | more algernonramone's commentslogin

I would love to see him write a book, or even just publish a nice compendium of his papers ala Donald Knuth's Collected Papers series (with light editing/updating, background info, commentary, etc.) I think that would truly be a pleasure to read.


I would too, though I should point out that I think all of Lamport's papers and books are free on his website: http://lamport.azurewebsites.net/pubs/pubs.html?from=https:/...

Some of them even have some basic background information if you click the link (e.g. Arbiter-Free Synchronization).


My thought here is that not all of the data in the database is being accessed at the same time, so the un-accessed data is "at rest". Is that correct, or am I barking up the wrong tree?


Assuming full-disk encryption is in use (LUKS, TrueCrypt/VeraCrypt, BitLocker, etc.), there is enough information held in RAM to decrypt the entire disk. If the attacker gains access to a privileged user, or at least to a user allowed to read the file system (such as the user running the database), they can exfiltrate the unencrypted contents of the disk, regardless of what the DB software is actively accessing.


Ah, OK, makes sense. Thanks for the clarification!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: